From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure and Efficient Delegation of Pairings with Online Inputs., , , и . CARDIS, том 12609 из Lecture Notes in Computer Science, стр. 84-99. Springer, (2020)Problems in group theory motivated by cryptography.. CoRR, (2018)Generalized Learning Problems and Applications to Non-commutative Cryptography., , , , и . ProvSec, том 6980 из Lecture Notes in Computer Science, стр. 324-339. Springer, (2011)Extended Abstract.Thompson's Group and Public Key Cryptography., и . ACNS, том 3531 из Lecture Notes in Computer Science, стр. 151-163. (2005)Single-Server Delegation of Ring Multiplications from Quasilinear-time Clients., , , , и . SIN, стр. 1-8. IEEE, (2021)Editorial.. Groups Complexity Cryptology, 6 (2): 71 (2014)On Isomorphism of Lie Algebras with One Defining Relation., , и . Int. J. Algebra Comput., 14 (3): 389-393 (2004)Authentication from Matrix Conjugation., и . Groups Complexity Cryptology, 1 (2): 199-205 (2009)Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups., , , и . ICMS, том 10931 из Lecture Notes in Computer Science, стр. 137-146. Springer, (2018)Using Semidirect Product of (Semi)groups in Public Key Cryptography., и . CiE, том 9709 из Lecture Notes in Computer Science, стр. 132-141. Springer, (2016)